Feature Selection Method Based on Correlation Tree

  • Prajak YapilaEmail author
  • Thanunchai Threepak
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1149)


Machine learning is one of techniques adapted to detect intrusion for cyber security. One of importance techniques to find anomaly is classification. But classification with huge dataset has the resources and time consumption. Feature selection is choice to reduce the data dimension to improve processing performance. In this paper, we introduce the new feature selection method that selects some fields of data set using position of each feature in correlation tree. Then, the result from the correlation tree feature selection of KDDCUP’99 data set are compared with two feature selection technique, correlation of coefficient (CC-type) and BFS by using three reference classifier, Decision Tree (DT), Random Forest (RF), and Naive Bayes (NB).


KDDCup’99 Machine learning Feature selection IDS Cyber security 


  1. 1.
    Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., Karimipour, H.: Cyber intrusion detection by combined feature selection algorithm. J. Inf. Secur. Appl. 44, 80–88 (2019)Google Scholar
  2. 2.
    Eid, H.F., Hassanien, A.E., Kim, T.-H., Banerjee, S.: Linear correlation-based feature selection for network intrusion detection model. In: The International Conference on Advances in Security of Information and Communication, pp. 240–248 (2013)Google Scholar
  3. 3.
    Rachburee, N., Punlumjeak, W.: Big data analytics: feature selection and machine learning for intrusion detection on microsoft azure platform. J. Telecommun. Electron. Comput. Eng. 9(1–4), 107–111 (2017)Google Scholar
  4. 4.
    Selvamani, D., Selvi, V.: A comparative study on the feature selection techniques for intrusion detection system. Asian J. Comput. Sci. Technol. 8(1), 42–47 (2019)Google Scholar
  5. 5.
    Naganhalli, N.S., Terdal, S.: Network intrusion detection using supervised machine learning technique. Int. J. Sci. Technol. Res. 8(09), 345–350 (2019)Google Scholar
  6. 6.
    El-Sappagh, S., Mohammed, E.-S., AlSheshtawy, T.A.: Multi-layer classifier for minimizing false intrusion. Int. J. Netw. Secur. Appl. 11(03), 43–52 (2019)Google Scholar
  7. 7.
    Gunduz, S.Y., Çeter, M.N.: Feature selection and comparison of classification algorithms for intrusion detection. Anadolu Univ. J. Sci. Technol. A – Appl. Sci. Eng. 19(1), 206–218 (2018)Google Scholar
  8. 8.
    Ugochukwu, C.J., Bennett, E.O.: An intrusion detection system using machine learning algorithm. Int. J. Comput. Sci. Math. Theory 4(1), 39–47 (2018)Google Scholar
  9. 9.
    Othman, S.M., Ba-Alwi, F.M., Alsohybe, N.T., Al-Hashida, A.Y.: Intrusion detection model using machine learning algorithm on big data environment. J. Big Data 5(1), 34 (2018). Scholar
  10. 10.
    Devi, K., Sukumar, R., Suresh Babu, R.: Lightweight network intrusion detection system using chi-square and cuckoo search optimization algorithms with decision tree classifier. Carib. J. Sci. 53(1), 117–129 (2019)Google Scholar
  11. 11.
    Priyadarsini, P.I., Sai, M.S.S., Suneetha, A., Santhi, M.V.B.T.: Robust feature selection technique for intrusion detection system. Int. J. Control Autom. 11(2), 33–44 (2018)CrossRefGoogle Scholar
  12. 12.
    Malhotra, H., Sharma, P.: Intrusion detection using machine learning and feature selection. Int. J. Comput. Netw. Inf. Secur. 11(4), 43–52 (2019)Google Scholar
  13. 13.
    Sakr, M.M., Tawfeeq, M.A., El-Sisi, A.B.: An efficiency optimization for network intrusion detection system. Int. J. Comput. Netw. Inf. Secur. 11(10), 1–11 (2019)Google Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Defence Engineering, Faculty of EngineeringKing Mongkut’s Institute of Technology LadkrabangBangkokThailand
  2. 2.Department of Computer Engineering, Faculty of EngineeringKing Mongkut’s Institute of Technology LadkrabangBangkokThailand

Personalised recommendations